GPS: Navigating weak memory with ghosts, protocols, and separation

A Turon, V Vafeiadis, D Dreyer - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Weak memory models formalize the inconsistent behaviors that one can expect to observe
in multithreaded programs running on modern hardware. In so doing, however, they …

A type system for privacy properties

V Cortier, N Grimm, J Lallemand, M Maffei - Proceedings of the 2017 …, 2017 - dl.acm.org
Mature push button tools have emerged for checking trace properties (eg secrecy or
authentication) of security protocols. The case of indistinguishability-based privacy …

Type-based verification of electronic voting protocols

V Cortier, F Eigner, S Kremer, M Maffei… - … 2015, Held as Part of the …, 2015 - Springer
E-voting protocols aim at achieving a wide range of sophisticated security properties and,
consequently, commonly employ advanced cryptographic primitives. This makes their …

Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations

M Backes, C Hriţcu, M Maffei - Journal of Computer Security, 2014 - content.iospress.com
We present a new type system for verifying the security of reference implementations of
cryptographic protocols written in a core functional programming language. The type system …

Differential privacy by ty** in security protocols

F Eigner, M Maffei - 2013 IEEE 26th Computer Security …, 2013 - ieeexplore.ieee.org
Differential privacy is a confidentiality property for database queries which allows for the
release of statistical information about the content of a database without disclosing personal …

Security and privacy by declarative design

M Maffei, K Pecina, M Reinert - 2013 IEEE 26th Computer …, 2013 - ieeexplore.ieee.org
The privacy of users has rapidly become one of the most pervasive and stringent
requirements in distributed computing. Designing and implementing privacy-preserving …

[PDF][PDF] Equivalence properties by ty** in cryptographic branching protocols

V Cortier, N Grimm, J Lallemand… - … 2018, Held as Part of the …, 2018 - library.oapen.org
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …

Modular verification of distributed systems with Grove

U Sharma - 2022 - dspace.mit.edu
Grove is a new framework for machine-checked verification of distributed systems. Grove
focuses on modular verification. It enables developers to state and prove specifications for …

Affine refinement types for secure distributed programming

M Bugliesi, S Calzavara, F Eigner… - ACM Transactions on …, 2015 - dl.acm.org
Recent research has shown that it is possible to leverage general-purpose theorem-proving
techniques to develop powerful type systems for the verification of a wide range of security …

[PDF][PDF] Equivalence Properties by Ty** in Cryptographic Branching Protocols

M Maffei - Principles of Security and Trust LNCS 10804 - dlib.hust.edu.vn
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …